Managing security is an important part of asset management. Setting up the security properly ensures that your data is secure while permitting users to have the access they need.
In most environments, you have different users who need various degrees of access to the Asset Management Suite features. These users might be data input workers, managers, or administrators. Each type of user has different access needs. For example, a supervisor user needs the rights to verify and update resource entries. A manager user needs to access the reports. An administrator user needs the rights to do everything. To set up security roles for all types of users, you can modify the predefined asset management security roles, or you can create new security roles.
In a large and a complex organization that has offices in several countries, additional security management might be necessary. For example, you might want to restrict each asset management team, so that they can only view and manage the assets for their own site. To accomplish this task, you need to create and configure site-specific security roles.
Managing security on an organizational group involves two main steps. You assign an organizational group to a security role, and then you set the security permissions for the organizational group.
Table: Process for managing security on an organizational group
(Optional) Create a custom security role.
When you want to manage security on an organizational group, the first step is to create the custom security roles. Custom security roles can help you better manage the assets that are dispersed over multiple sites or organizational units.